Chris Valasek, poses for a picture at the during the Los Angeles Auto Show on Wednesday, Nov. 19, 2014, in Los Angeles. Valasek, who helped catapult car hacking into the public eye when he and a partner revealed last year they had been able to control a 2010 Toyota Prius and 2010 Ford Escape by plugging into a port used by mechanics. (AP Photo/Chris Carlson)

LOS ANGELES (AP) — Against the team of hackers, the poor car stood no chance.

Meticulously overwhelming its computer networks, the hackers showed that — given time — they would be able to pop the trunk and start the windshield wipers, cut the brakes or lock them up, and even kill the engine.

Their motives were not malicious. These hackers worked on behalf of the U.S. military, which along with the auto industry is scrambling to fortify the cyber defenses of commercially available cars before criminals and even terrorists penetrate them.

“You’re stepping into a rolling computer now,” said Chris Valasek, who helped catapult car hacking into the public eye when he and a partner revealed last year they had been able to control a 2010 Toyota Prius and 2010 Ford Escape by plugging into a port used by mechanics.

These days, when Valasek isn’t working his day job for a computer security firm, he’s seeing how Bluetooth might offer an entry point.

Automakers are betting heavily that consumers will want not just the maps and music playlists of today but also Internet-enabled vehicles that stream movies and the turn dictation into email. The federal government wants to require cars to send each other electronic messages warning of dangers on the road.

In these and other connections, hackers see opportunity.

There are no publicly known instances of a car being commandeered outside staged tests. In those tests, hackers prevail.

One was the Defense Department-funded assault on a 2012 model American-made car, overseen by computer scientist Kathleen Fisher.

Hackers demonstrated they could create the electronic equivalent of a skeleton key to unlock the car’s networks. That may take months, Fisher said, but from there it would be “pretty easy to package up the smarts and make it available online, perhaps in a black-market type situation.”

The project’s goal is more than just to plug vulnerabilities — it is to reconceive the most critical lines of computer code that control the car in a way that could make them invulnerable to some of the major known threats. The model code would be distributed to automakers, who could adapt it to their needs. That should take a few more years.

The industry is participating — and not waiting.

One major association representing brands including Honda and Toyota is helping establish an “information sharing and analysis center” patterned after efforts by big banks to try to thwart cyberattacks.

“Before, when you designed something, you looked at how might components fail,” said Michael Cammisa, director of safety for the Association of Global Automakers. “Now, you have to look at how would somebody maliciously attack the vehicle.”